Do you consider what navinder did to example of cybercrimex

Assignment Help Computer Engineering
Reference no: EM133520067

Discussion Post

Purpose

This discussion is intended to help you learn to do the following:

1. Integrate ethical practice in real world context.

2. List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.

3. Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.

Action Items

I. Review the Case Study of High-Frequency Trading - "Flash Boys" in Kremling & Parker (2018).

"In March 2016, a judge asked for the extradition of the British high-frequency trader Navinder Singh Sarao to the United States. The British trader was accused of having a substantial role in the 2010 "flash crash" of the U.S. stock market by engaging in spoofing. In May 2010, the Dow Jones plunged by more than 1,000 points. High-frequency trading has received much attention as one of the contributors of the flash crash. Navinder Singh Sarao allegedly manipulated the stock market by putting in large orders for securities in an attempt to change the price for the securities. Once the price had changed, Navinder would cancel the order and take advantage of the price change. Between 2010 and 2014, Navinder made about $40 million in profits. One year later, he was charged by the U.S. government with wire fraud, commodities fraud, commodities manipulation, and spoofing" (Kremling & Parker, 2018, p210).

II. Create a post with a minimum 350 words that share the following:

1. Spoofing is illegal in the United States but not in Great Britain. If you were the British judge deciding over the extradition of Navinder Singh Sarao, which factors would you consider?

2. Matt Samelson, the chief executive of the consulting firm Woodbine Associates, stated: "Technically it is market manipulation, but some people would call that clever." If you were the defense attorney of Navinder Singh Sarao, what would you argue? Do you consider what Navinder did to be an example of cybercrime?

Reference no: EM133520067

Questions Cloud

What are some considerations for counselors in this scenario : Christian social worker how will that affect their ethical decisions? What are some considerations for counselors in this scenario
What is the difference between acute and chronic pain : What is the difference between acute and chronic pain? When does acute pain become chronic pain?
What is one of the choices she can take : what is one of the choices she can take? Group of answer choices Leave the job with resentment None of the listed Disrupt shared expectations Turn
The community service industry is constantly changing : The community service industry is constantly changing.
Do you consider what navinder did to example of cybercrimex : If you were the defense attorney of Navinder Singh Sarao, what would you argue? Do you consider what Navinder did to be an example of cybercrime?
Discuss the most common method used in workforce planning : The most common method used in workforce planning for anticipating supply of practitioners is: Group of answer choices Demands-based assessment Training-output
Triage nurse is assessing client in emergency department : A triage nurse is assessing a client in the emergency department. Do you have any allergies?
What is forecasting in operation management : What is Process Flow Analysis & Lean Just in Time? What is forecasting in operation management?
Urinary tract infection : Sarah is a 25-Year-Old female who is 8 weeks pregnant and has a urinary tract infection. What would be appropriate to prescribe to her?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd